1 | Now we place a special computer (the gateway) which acts as a functional intermediary between secure IntraNet and Insecure InterNet |
2 | Files are transferred back and forth by being deposited on Gateway. Gateway has security difficulties but it only has ephemeral information and can be compromised without serious implications |
3 | Firewall Computer I |
4 | Corporate |
5 | IntraNet |
6 | Global InterNet |
7 | Firewall Computer II |
8 | Gateway Computer |